期刊文献+

数据库活动监控工具的接口自动机模型

Interface automata model of database activity monitoring tool
下载PDF
导出
摘要 使用接口自动机描述软件各模块的内、外部行为,依据接口自动机的构件组合方法来描述总体框架的运行机制,可清晰地展示出基于网络嗅探的数据库活动监控工具的多DBMS协议分析支持、分布式部署与协同工作等难点的解决。给出了该工具主要模块的内、外部行为和工具整体行为的接口自动机模型,通过实验,验证了基于该模型所实现工具的正确性和可用性。 The inner and external behaviors of software modules can be described with interface automata, and also the overall framework operating mechanism can be described according to component composition method of interface automata. Therefore, by using interface automata the challenges of supporting multi-DBMS protocol analysis of database activity monitoring tool based on network sniffer, distributed deployment and cooperative work of the tool can be solved. Interface automata models have been given, which contain the inner and external behavior models of the tool' s main modules and the tool overall behavior model. In the end, experiments have been performed to verify correctness and usability of the tool implemented based on the model.
作者 薛疑 叶晓俊
出处 《计算机工程与应用》 CSCD 2012年第18期110-114,171,共6页 Computer Engineering and Applications
基金 国家"核高基"科技重大专项(No.2009ZX01045-004-001-03)
关键词 数据库安全 数据库活动监控 接口自动机 协议分析 database security database activity monitoring interface automata protocol analysis
  • 相关文献

参考文献8

  • 1Ghassan G J, Daniel A M.Policy-based enforcement of database security configuration through autonomic capa- bilities[C]//Fourth International Conference on Autonom- ic and Autonomous Systems,2008.
  • 2Boyd S W,Keromytis A D.SQLrand:preventing SQL in- jection attacks[C]//Applied Cryptography and Network Se-curity, 2004.
  • 3Ericsson K A, Simon H A.Protocol analysis[M].Cam- bridge : MIT Press, 1993.
  • 4De Alfaro L, Henzinger T.Interface automata[J].ACM SIG- SOFT Software Engineering Notes,2001,26(5): 109-120.
  • 5De Alfaro L,Henzinger T.Interface theories for compo- nent-based design[C]//LNCS 2211: Embedded Software, 2001.
  • 6谭亮,曾红卫.基于接口自动机的Web应用验证[J].计算机工程与应用,2009,45(3):70-73. 被引量:4
  • 7F|ater D,Gallagher L,Hurwitz S,el al.User's guide for the SQL test suite,version 6.0[Z].1996.
  • 8张亚维.数据库安全防护工具实现[D].北京:清华大学,2009.

二级参考文献13

  • 1张岩,胡军,于笑丰,李宣东,郑国梁.接口自动机——一种用于组件组合的形式系统[J].计算机科学,2005,32(11):212-217. 被引量:7
  • 2文艳军,王戟,齐治昌.一种接口自动机的组合精化检验方法[J].计算机工程与科学,2006,28(4):115-118. 被引量:1
  • 3杨军,葛海通,郑飞君,严晓浪.一种形式化验证方法:模型检验[J].浙江大学学报(理学版),2006,33(4):403-407. 被引量:17
  • 4Miao Huai-kou,Zeng Hong-wei.Model checking-based verification of Web application[C]//Proceedings of the Twelfth IEEE International Conference on Engineering of Complex Computer Systems (ICECCS07),2007,Auckland,New Zealand.Los Alamitos,CA:IEEE Computer Society Press, 2007 : 47-55.
  • 5Kung D C,Liu C H,Hsia P.An object-oriented Web test model for testing Web applications[C]//Proceedings of the 1st Asia-PacificConference on Web Applications(APAQS 2000).New York:IEEE Press,2000:111-120.
  • 6Huth M,Ryan M.Logic in computer science:modelling and reasoning about systems[M].Cambridge:Cambrialge University Press,2004.
  • 7McMillan K L.The SMV system for SMV version 2.5.4[EB/OL]. [2006-11 ].http://www.cs.cmu.edu/-modelcheck/smv/-smvmanual.ps.
  • 8Holzmann G J.The model checker SPIN[J]//IEEE Transactions on Software Engineering, 1997,23 (5) : 279-295.
  • 9Donini F M,Mongiello M,Ruta M,et al.A model checking-based method for verifying Web application design[J].Electronic Notes in Theoretical Computer Science,2006,151(2): 19-32.
  • 10de Alfaro L,Henzinger T A.Interface automata[C]//Proceedings of 9th Symposium on Foundations of Software Engineering,2001: 109-120.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部